Analysis
-
max time kernel
155s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 17:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
008a1399da9a0c5eae4e07d824aebbf5.exe
Resource
win7-20230831-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
008a1399da9a0c5eae4e07d824aebbf5.exe
Resource
win10v2004-20230915-en
3 signatures
150 seconds
General
-
Target
008a1399da9a0c5eae4e07d824aebbf5.exe
-
Size
187KB
-
MD5
008a1399da9a0c5eae4e07d824aebbf5
-
SHA1
226b71e8ac41b6b23da79ab029b8b2b7f658dd81
-
SHA256
abcbbdb2a2eb219a82c3f446f74ac6ef93a3deb11e4c277dee8c106792d7b783
-
SHA512
bacafe5f85a4fbee41aaaf38b0adfe02918b847b50260810ede0776f9eae0e3da187e9fcb082fdf41b0a45dedbacf525833878a1fe0f43fbf5486c947c6a6722
-
SSDEEP
3072:3AT14yQjetvX95X2mPtsvO++d77zE5ObRP5l1v:QT14y/f95Tmu77zw83
Score
10/10
Malware Config
Extracted
Family
raccoon
Botnet
31a59997888d26d92577b25b8030e2c1
C2
http://157.90.161.111:8086/
Attributes
-
user_agent
SunShineMoonLight
xor.plain
Signatures
-
Raccoon Stealer payload 4 IoCs
resource yara_rule behavioral2/memory/2508-1-0x0000000002060000-0x000000000207A000-memory.dmp family_raccoon behavioral2/memory/2508-2-0x0000000000400000-0x000000000043D000-memory.dmp family_raccoon behavioral2/memory/2508-3-0x0000000000400000-0x000000000043D000-memory.dmp family_raccoon behavioral2/memory/2508-5-0x0000000002060000-0x000000000207A000-memory.dmp family_raccoon -
Program crash 1 IoCs
pid pid_target Process procid_target 4856 2508 WerFault.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\008a1399da9a0c5eae4e07d824aebbf5.exe"C:\Users\Admin\AppData\Local\Temp\008a1399da9a0c5eae4e07d824aebbf5.exe"1⤵PID:2508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 97442⤵
- Program crash
PID:4856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2508 -ip 25081⤵PID:4116